<< Prev Question Next Question >>

Question 110/230

A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (230q)
Question 1: Which of the following techniques would attract the attentio...
Question 2: An accountant is transferring information to a bank over FTP...
Question 3: An organization is implementing a COPE mobile device managem...
Question 4: A forensic engineer determines that the root cause of a comp...
Question 5: An attacker submits a request containing unexpected characte...
Question 6: A network engineer is increasing the overall security of net...
Question 7: Which of the following is the primary purpose of a service t...
Question 8: A security analyst is creating base for the server team to f...
Question 9: An IT security team is concerned about the confidentiality o...
Question 10: A security team is reviewing the findings in a report that w...
Question 11: Which of the following alert types is the most likely to be ...
Question 12: A systems administrator receives a text message from an unkn...
Question 13: During the onboarding process, an employee needs to create a...
Question 14: Which of the following describes an executive team that is m...
Question 15: An engineer has ensured that the switches are using the late...
Question 16: Which of the following threat actors is the most likely to u...
Question 17: A security analyst developed a script to automate a trivial ...
Question 18: After a recent ransomware attack on a company's system, an a...
Question 19: After a series of account compromises and credential misuse,...
Question 20: Which of the following is the most effective way to protect ...
Question 21: While a user reviews their email, a host gets infected by ma...
Question 22: A security analyst and the management team are reviewing the...
Question 23: Which of the following should a systems administrator use to...
Question 24: Which of the following consequences would a retail chain mos...
Question 25: A security analyst is reviewing the following logs: (Exhibit...
Question 26: Executives at a company are concerned about employees access...
Question 27: A company plans to secure its systems by: Preventing users f...
Question 28: A company is required to use certified hardware when buildin...
Question 29: Which of the following is a common data removal option for c...
Question 30: Which of the following would best prepare a security team fo...
Question 31: Which of the following is the most likely to be included as ...
Question 32: An organization is building a new backup data center with co...
Question 33: An IT administrator needs to ensure data retention standards...
Question 34: Which of the following actions could a security engineer tak...
Question 35: An organization plans to expand its operations international...
Question 36: A systems administrator is creating a script that would save...
Question 37: The executive management team is mandating the company devel...
Question 38: The physical security team at a company receives reports tha...
Question 39: A penetration test has demonstrated that domain administrato...
Question 40: A security analyst is examining a penetration test report an...
Question 41: Which of the following must be considered when designing a h...
Question 42: Which of the following data states applies to data that is b...
Question 43: A company must ensure sensitive data at rest is rendered unr...
Question 44: A Chief Information Security Officer (CISO) has developed in...
Question 45: Which of the following best describes why me SMS DIP authent...
Question 46: A company is considering an expansion of access controls for...
Question 47: A security team installs an IPS on an organization's network...
Question 48: An administrator has configured a quarantine subnet for all ...
Question 49: A software developer would like to ensure. The source code c...
Question 50: An engineer needs to find a solution that creates an added l...
Question 51: After an audit, an administrator discovers all users have ac...
Question 52: A business provides long-term cold storage services to banks...
Question 53: An external vendor recently visited a company's headquarters...
Question 54: Which of the following is the best way to validate the integ...
Question 55: In which of the following will unencrypted PLC management tr...
Question 56: Which of the following is the best way to secure an on-site ...
Question 57: A company's online shopping website became unusable shortly ...
Question 58: A company's Chief Information Security Officer (CISO) wants ...
Question 59: A security analyst receives an alert from a corporate endpoi...
Question 60: An analyst identifies that multiple users have the same pass...
Question 61: Which of the following considerations is the most important ...
Question 62: An employee clicks a malicious link in an email that appears...
Question 63: Two companies are in the process of merging. The companies n...
Question 64: Client files can only be accessed by employees who need to k...
Question 65: Which of the following should a security operations center u...
Question 66: Which of the following describes the process of concealing c...
Question 67: Which of the following is a common source of unintentional c...
Question 68: A new vulnerability enables a type of malware that allows th...
Question 69: Which of the following allows for the attribution of message...
Question 70: Which of the following scenarios describes a possible busine...
Question 71: Which of the following activities are associated with vulner...
Question 72: A company is using a legacy FTP server to transfer financial...
Question 73: An employee receives a text message from an unknown number c...
Question 74: The security operations center is researching an event conce...
Question 75: A customer of a large company receives a phone call from som...
Question 76: Employees in the research and development business unit rece...
Question 77: Which of the following phases of the incident response proce...
Question 78: Which of the following security concepts is accomplished wit...
Question 79: The local administrator account for a company's VPN applianc...
Question 80: Which of the following most accurately describes the order i...
Question 81: While a school district is performing state testing, a secur...
Question 82: An organization has recently decided to implement SSO. The r...
Question 83: According to various privacy rules and regulations, users ha...
Question 84: A security engineer at a large company needs to enhance IAM ...
Question 85: A company implemented an MDM policy 10 mitigate risks after ...
Question 86: An organization recently updated its security policy to incl...
Question 87: A systems administrator wants to use a technical solution to...
Question 88: Which of the following definitions best describes the concep...
Question 89: A company wants to improve the availability of its applicati...
Question 90: A systems administrator receives the following alert from a ...
Question 91: Which of the following explains why an attacker cannot easil...
Question 92: While investigating a recent security breach an analyst find...
Question 93: A security analyst has determined that a security breach wou...
Question 94: Which of the following is a compensating control for providi...
Question 95: A Chief Information Security Officer would like to conduct f...
Question 96: A security analyst discovers that a large number of employee...
Question 97: A visitor plugs a laptop into a network jack in the lobby an...
Question 98: Which of the following would be best suited for constantly c...
Question 99: Which of the following would a security administrator use to...
Question 100: A company wants to verify that the software the company is d...
Question 101: A company's marketing department collects, modifies, and sto...
Question 102: Which of the following is a reason why a forensic specialist...
Question 103: A company is concerned about weather events causing damage t...
Question 104: A spoofed identity was detected for a digital certificate. W...
Question 105: An enterprise is trying to limit outbound DNS traffic origin...
Question 106: An employee clicked a link in an email from a payment websit...
Question 107: A company identified the potential for malicious insiders to...
Question 108: A data administrator is configuring authentication for a Saa...
Question 109: Which of the following actions must an organization take to ...
Question 110: A security analyst is investigating an application server an...
Question 111: A systems administrator wants to prevent users from being ab...
Question 112: A small business uses kiosks on the sales floor to display p...
Question 113: Which of the following is the best way to improve the confid...
Question 114: A systems administrator is redesigning now devices will perf...
Question 115: A security analyst reviews web server logs and sees the foll...
Question 116: Which of the following factors are the most important to add...
Question 117: Which of the following security controls would best guard a ...
Question 118: A growing organization, which hosts an externally accessible...
Question 119: Which of the following could potentially be introduced at th...
Question 120: Which of the following best describes the concept of informa...
Question 121: While considering the organization's cloud-adoption strategy...
Question 122: During an investigation, an incident response team attempts ...
Question 123: A security administrator would like to protect data on emplo...
Question 124: Which of the following methods would most likely be used to ...
Question 125: After a recent vulnerability scan, a security engineer needs...
Question 126: In which of the following scenarios is tokenization the best...
Question 127: After failing an audit twice, an organization has been order...
Question 128: Which of the following practices would be best to prevent an...
Question 129: A company plans to secure its systems by: Preventing users f...
Question 130: A security analyst is assessing several company firewalls. W...
Question 131: An engineer moved to another team and is unable to access th...
Question 132: An organization has a new regulatory requirement to implemen...
Question 133: An attorney prints confidential documents to a copier in an ...
Question 134: Which of the following digital forensics activities would a ...
Question 135: A company is utilizing an offshore team to help support the ...
Question 136: Which of the following is the first step to take when creati...
Question 137: A company's accounts payable clerk receives a message from a...
Question 138: Which of the following tools can assist with detecting an em...
Question 139: An organization wants a third-party vendor to do a penetrati...
Question 140: A new security regulation was announced that will take effec...
Question 141: A security analyst is reviewing alerts in the SIEM related t...
Question 142: An administrator assists the legal and compliance team with ...
Question 143: An employee in the accounting department receives an email c...
Question 144: An employee receives a text message that appears to have bee...
Question 145: Which of the following should a security administrator adher...
Question 146: Which of the following is a benefit of vendor diversity?...
Question 147: Which of the following is used to protect a computer from vi...
Question 148: An administrator is Investigating an incident and discovers ...
Question 149: Which of the following exercises should an organization use ...
Question 150: An organization experiences a cybersecurity incident involvi...
Question 151: An IT manager is putting together a documented plan describi...
Question 152: A company is considering an expansion of access controls for...
Question 153: A company relies on open-source software libraries to build ...
Question 154: A recent penetration test identified that an attacker could ...
Question 155: Which of the following is a benefit of an RTO when conductin...
Question 156: An organization is required to provide assurance that its co...
Question 157: A security team receives reports about high latency and comp...
Question 158: An IT manager is increasing the security capabilities of an ...
Question 159: A systems administrator notices that one of the systems crit...
Question 160: An organization's web servers host an online ordering system...
Question 161: For which of the following reasons would a systems administr...
Question 162: Which of the following practices would be best to prevent an...
Question 163: The Chief Information Officer (CIO) asked a vendor to provid...
Question 164: A company has begun labeling all laptops with asset inventor...
Question 165: An employee fell for a phishing scam, which allowed an attac...
Question 166: A security analyst learns that an attack vector, which was u...
Question 167: A company is adding a clause to its AUP that states employee...
Question 168: Which of the following is a type of vulnerability that refer...
Question 169: A security team created a document that details the order in...
Question 170: Which of the following can a security director use to priori...
Question 171: A security professional discovers a folder containing an emp...
Question 172: Which of the following is the best reason to complete an aud...
Question 173: Which of the following is the most relevant reason a DPO wou...
Question 174: A newly identified network access vulnerability has been fou...
Question 175: After a security awareness training session, a user called t...
Question 176: Which of the following should an organization focus on the m...
Question 177: Which of the following is the most likely motivation for a h...
Question 178: Which of the following techniques can be used to sanitize th...
Question 179: A company requires hard drives to be securely wiped before s...
Question 180: Which of the following should be used to aggregate log data ...
Question 181: Which of the following is most likely associated with introd...
Question 182: An employee clicked a malicious link in an email and downloa...
Question 183: A company wants to ensure secure remote access to its intern...
Question 184: Which of the following is a risk of conducting a vulnerabili...
Question 185: Which of the following would be the best way to block unknow...
Question 186: Which of the following would be the most appropriate way to ...
Question 187: Which of the following activities should a systems administr...
Question 188: A healthcare organization wants to provide a web application...
Question 189: An administrator notices that several users are logging in f...
Question 190: A technician needs to apply a high-priority patch to a produ...
Question 191: Which of the following is a possible consequence of a VM esc...
Question 192: An organization is developing a security program that convey...
Question 193: A penetration test identifies that an SMBvl Is enabled on mu...
Question 194: Which of the following agreement types defines the time fram...
Question 195: Which of the following incident response activities ensures ...
Question 196: When trying to access an internal website, an employee repor...
Question 197: A company is concerned about the theft of client data from d...
Question 198: Which of the following should be deployed on an externally f...
Question 199: Which of the following security concepts is the best reason ...
Question 200: Which of the following are cases in which an engineer should...
Question 201: A security consultant needs secure, remote access to a clien...
Question 202: Visitors to a secured facility are required to check in with...
Question 203: Which of the following would help ensure a security analyst ...
Question 204: You are security administrator investigating a potential inf...
Question 205: Which of the following is the phase in the incident response...
Question 206: A systems administrate wants to implement a backup solution....
Question 207: The management team notices that new accounts that are set u...
Question 208: Which of the following would most likely be deployed to obta...
Question 209: An organization needs to monitor its users' activities to pr...
Question 210: Sine a recent upgrade (o a WLAN infrastructure, several mobi...
Question 211: Which of the following is a reason why a forensic specialist...
Question 212: Several employees received a fraudulent text message from so...
Question 213: Which of the following is used to quantitatively measure the...
Question 214: A network manager wants to protect the company's VPN by impl...
Question 215: A technician wants to improve the situational and environmen...
Question 216: A security analyst receives an alert that there was an attem...
Question 217: A company needs to provide administrative access to internal...
Question 218: A company processes and stores sensitive data on its own sys...
Question 219: Which of the following must be considered when designing a h...
Question 220: Which of the following cryptographic solutions protects data...
Question 221: Which of the following would be most useful in determining w...
Question 222: A security analyst wants to better understand the behavior o...
Question 223: A user needs to complete training at https://comptiatraining...
Question 224: Which of the following involves an attempt to take advantage...
Question 225: A software development manager wants to ensure the authentic...
Question 226: During a recent log review, an analyst found evidence of suc...
Question 227: Which of the following threat actors would most likely defac...
Question 228: A security officer is implementing a security awareness prog...
Question 229: Which of the following is the best way to consistently deter...
Question 230: A security administrator needs a method to secure data in an...